Hackers Using Weaponized Memes to Communicate with Malware for Malicious Operations

Researchers recently observed that cyber criminals using a weaponized memes in order to communicate with malware for various malicious operations.

Memes are nowadays using for fast communication methods to spreading news which is now abused by cyber criminals to reach victims in a very effective way.

Attackers using Steganography to embed the malicious payload inside of the image to bypass the security solutions to compromise vicitms.

Similarly last year, attackers using 2 memes that was posted in twitter that contain embedded link which point to the command & control server where malware dropped into victims system.

Currently observed campaign being delivered via legitimate service, a popular social media service where attackers posted a meme that looks like very benign.

Malware Infection Process

Initially, once users infected by malware which download malicious memes from Twitter account to the victim’s machine

Further analysis reveals that the memes contain a “/print” command hidden inside that will be extracted and helps malware to take a screenshot of the infected victim’s machine.

The later moment it communicates with Command & control server from pastebin and send the collected screenshots of the victim’s machine. 

Also, researcher observed that Pastebin URL points to an internal or private IP address, which is possibly a temporary placeholder used by the attackers.

Attackers parse the malicious memes from the twitter account where the file posted using a specific pattern.

  “<img src=\”(.*?):thumb\” width=\”.*?\” height=\”.*?\”/>”

Image : TrendMicro

According to Trend Micro, There where 2 memes were posted which contains a command that helps malware to perform  various malicious operation such as capture screenshots, collect system information, among others.

Following commands used by malware to retrieve the information from the infected machine.

Commands
Description
/printScreen capture
/processosRetrieve list of running processes
/clipCapture clipboard content
/usernameRetrieve username from infected machine
/docsRetrieve filenames from a predefined path such as (desktop, %AppData% etc.)

Indicators of Compromise

 Hashes (SHA-256)

  • 003673cf045faf0141b0bd00eff13542a3a62125937ac27b80c9ffd27bb5c722
  • 3579d609cf4d0c8b469682eb7ff6c65ec634942fa56d47b666db7aa99a2ee3ef
  • 88b06e005ecfab28cfdbcab98381821d7cc82bb140894b7fdc5445a125ce1a8c
  • 8cdb574ba6fcaea32717c36b47fec0309fcd5c6d7b0f9a58fc546b74fc42cacd

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Powerful Mobile Malware Rotexy Launched over 70,000 Attacks with Banking Trojan & Ransomware Modules

$60 Million Worth Cryptocurrencies Stolen Hackers From Japanese Cryptocurrency Exchange

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

CISA Warns of Adobe & Windows Kernel Driver Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert, adding two significant…

54 minutes ago

The Rise of AI-Generated Professional Headshots

It’s clear that a person’s reputation is increasingly influenced by their online presence, which spans…

15 hours ago

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals, as…

18 hours ago

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls

Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in Israel…

18 hours ago

Hackers Exploiting Apache Struts2 Vulnerability to Upload Malicious Payloads

Hackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used open-source…

18 hours ago

Hackers Weaponizing Microsoft Teams to Gain Remote Access

Recent cybersecurity research has uncovered a concerning trend where hackers are exploiting Microsoft Teams to…

19 hours ago